Results 51 to 60 of about 1,926,564 (269)

An Improved Key Agreement Protocol Based on Fractal Theory [PDF]

open access: yesEngineering and Technology Journal, 2014
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj   +1 more source

Staging quantum cryptography with chocolate balls

open access: yes, 2005
Moderated by a director, laymen and students are encouraged to assume the role of quanta and enact a quantum cryptographic protocol. The performance is based on a generalized urn model capable of reproducing complementarity even for classical chocolate ...
Svozil, Karl
core   +1 more source

Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States

open access: yesAdvanced Functional Materials, EarlyView.
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni   +6 more
wiley   +1 more source

Oblivious Transfer based on Key Exchange

open access: yes, 2007
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh   +3 more
core   +1 more source

Body Biofluids for Minimally‐Invasive Diagnostics: Insights, Challenges, Emerging Technologies, and Clinical Potential

open access: yesAdvanced Healthcare Materials, EarlyView.
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao   +2 more
wiley   +1 more source

Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)

open access: yesCryptography, 2019
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonable ...
Jeff Calhoun   +5 more
doaj   +1 more source

Liquid‐in‐Liquid Prints: High‐Density Biochemically Encoded Information Preserved in Microdroplet Arrays

open access: yesAdvanced Materials, EarlyView.
This work introduces a novel approach for encoding and storing information in the liquid state in microdroplet arrays. These liquid‐in‐liquid prints are generated by a droplet printing system capable of dynamically setting the composition of each droplet pixel.
Maximilian Breitfeld   +5 more
wiley   +1 more source

On the Design of Cryptographic Primitives

open access: yes, 2010
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater   +10 more
core   +1 more source

A new non-commutative key exchange protocol on combinatorial semigroup

open access: yesAutomatika
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj   +1 more source

LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols

open access: yesIEEE Access, 2019
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy